Break Into Security; Is It Broken  By  cover art

Break Into Security; Is It Broken

By: Akyl Ambition Phillips
  • Summary

  • Welcome to 'Break Into Security: Is It Broken?' where we explore the exciting world of cybersecurity and the many challenges and opportunities for those looking to break into the industry. From understanding the latest cybersecurity concepts to learning about the different career paths available, our podcast is your go-to resource for all things security. Whether you're a student, a recent graduate, or a professional looking to make a career change, our expert guests and in-depth discussions will provide you with the insights and knowledge you need to succeed in this fast-paced and ever-evolving field. So join us as we delve into the world of security and discover if the industry is truly broken or if there are just a few cracks in the system.
    © 2024 Mogul Prep LLC.
    Show more Show less
Episodes
  • The Swiss Army Knives of Hacking: Netcat, Ncat, and Nmap
    May 30 2023

    Welcome to another episode of the "Break Into Security: Is It Broken?" podcast with your host, Akyl "Ambition" Phillips. In this episode, we delve into the world of hacking and discuss the Swiss Army knives of the trade. Akyl introduces us to three powerful tools: Netcat, Ncat, and Nmap.

    Netcat, which emerged in October 1995, and its counterpart Ncat, developed a year later, share similar functionalities but are not coded with the same source code. These command-line utilities are essential for any aspiring hacker or security engineer. Akyl takes us through the various applications of these tools, from opening Netcat listeners to file transfers and downloads, data encryption with the Open SSL toolkit, banner grabbing, live drive cloning, and even remote and reverse shells.

    But why are these tools considered Swiss Army knives? Akyl explains how Nmap, created by Gordon Lyons in 1997, brings network mapping, OS detection, and scripting into the mix. Nmap, coded in C and C++, with additional support for Python and Lua, combines the functionalities of Netcat and Ncat while adding advanced features. It becomes a must-have resource for network engineers, security professionals, and aspiring penetration testers.

    For those looking to explore these powerful tools further, Akyl provides valuable resources in the podcast description. The NMAP Guide offers comprehensive information on Nmap, while the Netcat cheat sheet provides a handy reference for understanding the Swiss Army nature of these tools.

    Whether you're an industry newcomer or an experienced professional, understanding and utilizing these Swiss Army knives of network and system security is crucial. Join Akyl in uncovering the vast capabilities and potential of Netcat, Ncat, and Nmap in this enlightening episode.

    Tune in now to sharpen your hacking skills and gain insights into the world of network security.

    Netcat Cheatsheet- https://quickref.me/nc.html

    NCat Cheatsheet- https://kalinull.medium.com/ncat-cheatsheet-ddc5f07d8533

    NMAP Cheatsheet- https://www.stationx.net/nmap-cheat-sheet/

    NMAP Ref Guide- https://nmap.org/book/man.html

    Command from Video {nc -l -p [port#] -e /bin/bash}

    Show more Show less
    6 mins
  • Initial Access: Mastering the MITRE ATT&CK Matrix
    Apr 23 2023

    In this episode of "Break Into Security: Is it Broken?", host Akyl Ambition Phillips takes you on an animated, pleasantly aggressive deep dive into the world of the MITRE ATT&CK Matrix. With a decade+ of experience in information technology, information security, and cybersecurity, Akyl shares his insights and knowledge tailored for both newcomers and experienced professionals in the cybersecurity field. Discover the landscape of cybersecurity in 2023, the benefits of utilizing the MITRE ATT&CK Matrix, and its application in various environments. Also, explore initial access techniques, including drive-by compromise, replication through removable media, and supply chain compromise. This episode is perfect for those breaking into the industry, those who want to learn more about the MITRE ATT&CK Matrix, or experienced professionals looking to expand their understanding. So, join Akyl for an engaging and informative journey into the world of cybersecurity!

    Checkout the Mitre Att&CK 

    Watch the Full Video Presentation on Youtube

    Show more Show less
    26 mins
  • Becoming a Cybersecurity Risk Management Expert with Patrick Jeanty
    Feb 13 2023

    Welcome to an electrifying episode of "Break into Security; Is it Broken?" where we delve into the captivating journey of a Marine veteran who has made a successful transition into the world of cybersecurity. This Cyber Risk Management Expert shares their story, offering an inside look at the challenges and triumphs along the way.

    Don't miss out on the chance to hear from someone who has lived the experience and can provide valuable insights and guidance for veterans looking to break into cybersecurity. From understanding the industry's landscape to developing the necessary skills, our guest covers it all.

    We also discuss the current state of the industry, including the skills shortage, the importance of diversity and inclusivity, and what the future holds. Join us for a thought-provoking conversation that will leave you feeling inspired and motivated to pursue your own path in cybersecurity.

    So, if you're a veteran interested in transitioning into the field, or just looking for some guidance, tune in now! This episode of "Break into Security; Is it Broken?" is a must-listen for anyone who wants to thrive in the fast-paced world of cybersecurity. Don't wait, hit the play button now!

    Show more Show less
    39 mins
activate_proofit_target_DT_control

What listeners say about Break Into Security; Is It Broken

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.